the world we inhabit is constantly increasing in complexity and withthis comes a need for new ways of understanding and thinking that can manage this complexity. A key part of managing this complexity involves constr...
详细信息
distributed tracing is crucial to achieve observability in modern distributedsystems. However, its adoption introduces performance trade-offs, impacting throughput and latency. this paper investigates the overhead of...
详细信息
ISBN:
(纸本)9798400711305
distributed tracing is crucial to achieve observability in modern distributedsystems. However, its adoption introduces performance trade-offs, impacting throughput and latency. this paper investigates the overhead of distributed tracing in microservices and serverless applications. We provide an analysis of the popular OpenTelemetry and Elastic APM distributed tracing frameworks, evaluating their performance impact on microservices and serverless workloads. We highlight and categorize the primary sources of overhead and measure their contribution to performance degradation. the results reveal significant throughput reductions (19-80%) and latency increases (up to 175%) depending on application configurations and execution environments. Our findings reveal that serializing trace data for export is the largest cause of overhead.
the proceedings contain 72 papers. the topics discussed include: user interface matters: analyzing the complexity of mobile applications from a visual perspective;rediscovering refugee routes: on the creation of colle...
the proceedings contain 72 papers. the topics discussed include: user interface matters: analyzing the complexity of mobile applications from a visual perspective;rediscovering refugee routes: on the creation of collective memory map services;city tourism services with mobile geolocation sharing;smart city transition pillars with layered applications architecture;energy efficient task scheduling in fog environment using deep reinforcement learning approach;using time-correlated noise to encourage exploration and improve autonomous agents performance in reinforcement learning;sustainability of load balancing techniques in fog computing environment: review;and toward fast and reliable active-active geo-replication for a distributed data caching service in the mobile cloud.
We develop an open-source software tool, called PRoTECT, using sum-of-squares (SOS) optimization to search for barrier certificates (BCs) that verify safety properties over four classes of polynomial systems: (i) disc...
详细信息
ISBN:
(纸本)9798400714986
We develop an open-source software tool, called PRoTECT, using sum-of-squares (SOS) optimization to search for barrier certificates (BCs) that verify safety properties over four classes of polynomial systems: (i) discrete-time stochastic systems, (ii) discrete-time deterministic systems, (iii) continuous-time stochastic systems, and (iv) continuous-time deterministic systems. PRoTECT is the first software tool that offers stochastic BCs while leveraging parallelism to efficiently search for a feasible BC for different polynomial degrees. PRoTECT is implemented in Python offering both an application programming interface (API) and a user-friendly graphic user interface (GUI).
the proceedings contain 121 papers. the topics discussed include: a discrete event simulation model for understanding kernel lock thrashing on multi-core architectures;privacy protection in participatory sensing appli...
ISBN:
(纸本)9780769543079
the proceedings contain 121 papers. the topics discussed include: a discrete event simulation model for understanding kernel lock thrashing on multi-core architectures;privacy protection in participatory sensing applications requiring fine-grained locations;a scheduling method for avoiding kernel lock thrashing on multi-cores;an effective framework of light-weight handling for three-level fine-grained recoverable temporal violations in scientific workflows;resilient virtual network service provision in network virtualization environments;detection of behavioral contextual properties in asynchronous pervasive computing environments;automatic thread decomposition for pipelined multithreading;optimistic localization: avoiding location ambiguity in wireless ad-hoc networks;mixed-parallel implementations of extrapolation methods with reduced synchronization overhead for large shared-memory computers;and performance data extrapolation in parallel codes.
the proceedings contain 32 papers. the topics discussed include: professional course offered within a technical academy concerning the innovative BIM technology;heatmap matrix: using reordering, discretization and fil...
ISBN:
(纸本)9789898704429
the proceedings contain 32 papers. the topics discussed include: professional course offered within a technical academy concerning the innovative BIM technology;heatmap matrix: using reordering, discretization and filtering resources to assist multidimensional data analysis;BIM teaching and programing in dynamo applied in the maintenance of buildings;3D pose estimation by grouped feature fusion and motion amplitude encoding;identifying wear particles withtheir shape attribute;using reorderable heatmaps as a support for data assimilation in petroleum reservoir management and development processes;detection of fashion landmarks based on pose estimation and human parsing;design elements extraction based on unsupervised segmentation and compact vectorization;domain adaptation in image dehazing: exploring the usage of images from virtual scenarios;and interpolation and context magnification framework for classification of scene images.
the proceedings contain 153 papers. the topics discussed include: evolution of publicly disclosed information in facebook profiles;practical application-level dynamic taint analysis of android apps;authenticating comp...
ISBN:
(纸本)9781509049059
the proceedings contain 153 papers. the topics discussed include: evolution of publicly disclosed information in facebook profiles;practical application-level dynamic taint analysis of android apps;authenticating compromisable storage systems;immediate attribute revocation in decentralized attribute-based encryption access control;on the effectiveness of ambient sensing for detecting NFC relay attacks;pseudo anonymous and hidden attribute comparison based on quick friend matching in mobile social networks;a distinction method of flooding DDoS and flash crowds based on user traffic behavior;based on multi-features and clustering ensemble method for automatic malware categorization;and a practical anti-collusion hierarchical identity-based non-interactive key agreement for wireless networks.
the proceedings contain 60 papers. the topics discussed include: a global data source for temporal web mining;metrics for best practice networks analysis;software architecture for web-based project management system;s...
ISBN:
(纸本)1891706284
the proceedings contain 60 papers. the topics discussed include: a global data source for temporal web mining;metrics for best practice networks analysis;software architecture for web-based project management system;software clustering using drools tool;a model proposal for program comprehension;software process reuse based on knowledge and process components;ontological filters for slow intelligence systems;modeling human intelligence as a slow intelligence system;SINMS: a slow intelligence network manager based on SNMP protocol;building topic/trend detection system based on slow intelligence;a generic architecture for surveillance systems;privacy enforcement by identity management in smart surveillance systems;RFID applications in hospitals - a case study for emergency department;and a technical model using genetic algorithm for the cosmetic tourism business.
the proceedings contain 200 papers. the topics discussed include: analyzing the optimal voltage/frequency pair in fault-tolerant caches;dynamic WCET estimation for real-time multicore embedded systems supporting DVFS;...
ISBN:
(纸本)9781479961238
the proceedings contain 200 papers. the topics discussed include: analyzing the optimal voltage/frequency pair in fault-tolerant caches;dynamic WCET estimation for real-time multicore embedded systems supporting DVFS;remapping NUCA: improving NUCA cache's power efficiency;SCADOPT: an open-source HPC framework for solving PDE constrained optimization problems using AD;accelerated solution of Helmholtz equation with iterative Krylov methods on GPU;benefit of unbalanced traffic distribution for improving local optimization efficiency in network-on-chip;research on Mahalanobis distance algorithm optimization based on OpenCL;parallel sub-structuring methods for solving sparse linear systems on a cluster of GPUs;optimizing cache locality for irregular data accesses on many-core Intel Xeon phi accelerator chip;securing cloud users at runtime via a market mechanism: a case for federated identity;and cloud energy broker: towards SLA-driven green energy planning for IaaS providers.
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they ...
详细信息
ISBN:
(纸本)9798400714986
Multi-agent collaboration enhances situational awareness in intelligence, surveillance, and reconnaissance (ISR) missions. Ad hoc networks of unmanned aerial vehicles (UAVs) allow for real-time data sharing, but they face security challenges due to their decentralized nature, making them vulnerable to cyber-physical attacks. this paper introduces a trust-based framework for assured sensor fusion in distributed multi-agent networks, utilizing a hidden Markov model (HMM)-based approach to estimate the trustworthiness of agents and their provided information in a decentralized fashion. Trust-informed data fusion prioritizes fusing data from reliable sources, enhancing resilience and accuracy in contested environments. To evaluate the assured sensor fusion under attacks on system/mission sensing, we present a novel multi-agent aerial dataset built from the Unreal Engine simulator. We demonstrate through case studies improved ISR performance and an ability to detect malicious actors in adversarial settings.
暂无评论